102:
describes when an attack has taken place but the
Computer Network Defense system is not at its highest alertness. Non-essential networks may be taken offline, and alternate methods of communication may be
60:
describes a situation where there is no apparent hostile activity against computer networks. Operational performance of all information systems is monitored, and password systems are used as a layer of
109:
describes when attacks are taking place and the
Computer Network Defense system is at maximum alertness. Any compromised systems are isolated from the rest of the network.
199:
41:. It is a defense system based primarily on the status of information systems and is a method used by the military to defend against a computer network attack.
141:, the US government goes to INFOCON 2 when Francis Gibson has a massive cyber attack initiated upon the United States, nearly bringing it to war with China.
17:
237:
68:
253:
67:
describes an increased risk of attack. Increased monitoring of all network activities is mandated, and all
88:
describes when a risk has been identified. Security review on important systems is a priority, and the
230:
89:
217:
200:"Department of Defense (DOD) Information Operations Condition (INFOCON) System Procedures"
8:
155:
137:
49:
There are five levels of INFOCON, which recently changed to more closely correlate to
181:
79:
247:
78:
usage may be restricted to government sites only, and backing up files to
150:
197:
186:
170:
124:
75:
71:
37:) is a threat level system in the United States similar to that of
160:
93:
165:
113:
50:
175:
38:
27:
Defending against computer-based network attacks or threats
198:
Strategic
Command Directive (SD) 527-1 (2006-01-27).
92:system's alertness is increased. All unclassified
245:
123:Symantec's ThreatCon service no longer exists.
114:Similar concepts in private-sector computing
74:must make sure their systems are secure.
236:CS1 maint: numeric names: authors list (
118:
14:
246:
130:
24:
25:
265:
35:information operations condition
18:Information Operations Condition
44:
13:
1:
192:
96:connections are disconnected.
7:
144:
10:
270:
205:. DISA Policy and Guidance
254:Alert measurement systems
90:Computer Network Defense
127:has acquired Symantec.
225:Cite journal requires
69:Department of Defense
119:ThreatCon (Symantec)
53:levels. They are:
156:Attack (computing)
135:In the TV Series,
131:In popular culture
182:Threat (computer)
16:(Redirected from
261:
241:
234:
228:
223:
221:
213:
211:
210:
204:
21:
269:
268:
264:
263:
262:
260:
259:
258:
244:
243:
235:
226:
224:
215:
214:
208:
206:
202:
195:
147:
133:
121:
116:
80:removable media
47:
28:
23:
22:
15:
12:
11:
5:
267:
257:
256:
227:|journal=
194:
191:
190:
189:
184:
179:
173:
168:
163:
158:
153:
146:
143:
132:
129:
120:
117:
115:
112:
111:
110:
104:
97:
83:
62:
46:
43:
26:
9:
6:
4:
3:
2:
266:
255:
252:
251:
249:
242:
239:
232:
219:
201:
188:
185:
183:
180:
177:
174:
172:
169:
167:
164:
162:
159:
157:
154:
152:
149:
148:
142:
140:
139:
128:
126:
108:
105:
101:
98:
95:
91:
87:
84:
81:
77:
73:
70:
66:
63:
59:
56:
55:
54:
52:
42:
40:
36:
32:
19:
218:cite journal
207:. Retrieved
196:
136:
134:
122:
106:
103:implemented.
99:
85:
64:
57:
48:
34:
30:
29:
178:(THREATCON)
151:Alert state
61:protection.
45:Description
33:(short for
209:2009-09-27
193:References
107:INFOCON 1
100:INFOCON 2
86:INFOCON 3
82:is ideal.
72:end users
65:INFOCON 4
58:INFOCON 5
248:Category
187:WATCHCON
171:EMERGCON
145:See also
125:Broadcom
76:Internet
161:LERTCON
94:dial-up
31:INFOCON
166:DEFCON
138:Crisis
51:DEFCON
203:(PDF)
176:FPCON
39:FPCON
238:link
231:help
250::
222::
220:}}
216:{{
240:)
233:)
229:(
212:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.